Module 2: Case Studies & Examples

Steps to Follow

Download the example data here https://cyberriskmodels.com/crq-open-education

The Module 2 Assignment Excel Workbook contains several tabs, each with vulnerability data for you to analyze. To analyze the data for each tab, please follow the process below:

  1. Visually inspect the vulnerability data and develop a set of keywords for analysis.
  2. Review the auto-generated chart.
  3. Which vulnerabilities could likely lead to initial access?
    • How many instances of this type of vulnerability are in the data set?
  4. Which vulnerabilities could likely lead to privilege escalation?
    • How many instances of this type of vulnerability are in the data set?
  5. Which vulnerabilities should be recommended to be prioritized for remediation?

Example 1: Microsoft 2023 Data

The sample data is represented in the image below. Use the Microsoft 2023-tab data.

As you visually inspect the data, make a list of possible keywords. Since the data is already organized by vendor and software, you will be looking for those keywords that are related to the attack stages. What vulnerabilities might be used?

Here are some keywords relevant to this data set: denial of Service, Elevation of Privilege, Remote Code Execution, Disclosure, Cross-Site Scripting, Bypass, Spoofing, and SMB.

image

Figure 12 Microsoft 2023 Sample Data

Take note of the auto-complete charts that are included in the workbook. What do they tell you about the data? Which keywords have the highest instances?

Figure 13 Microsoft 2023 Sample Data Charts

Recall how we discussed matching keywords to the first three stages of an attack. Which vulnerabilities in this data set could likely lead to initial access? If we filter on code execution and cross-site scripting, you will have a good list. How many instances of these exploitable vulnerabilities are there in the data set?

Based on this, which vulnerabilities would you recommend being prioritized for remediation?

image

Figure 14 Microsoft Example Vulnerabilities for Initial Access

Now, can you identify the vulnerabilities most likely to be used to elevate privileges? Did you filter the list and get the same set as depicted below?

image

Figure 15 Microsoft Privilege Escalation Vulnerabilities

Example 2: McAfee Data

Visually inspect the data and identify operating systems. You should find Windows, Mac and Linux. Using these three keywords which operating system has more McAfee related vulnerabilities?

Figure 16 McAfee Operating System Findings

Now review the data and file exploitable keywords. You should have a list that includes access control, executable files, privilege escalation, cross site scripting, buffer overflow and path traversal.

Figure 17 McAfee Exploitable Vulnerabilities

From the table above, which exploitable vulnerability has the highest count, and which has the lowest count? Now, filter the data to identify which vulnerabilities could likely lead to privilege escalation.

image

Figure 18 McAfee Privilege Escalation Vulnerabilities

Example 3: Exchange 2020 Data

Visually inspect the data and identify the keywords to use. You should have a list that includes remote code execution, elevation of privilege, cross-site scripting, authenticated, denial of service, buffer overflow, authentication bypass, brute force, disclosure, and algorithm.

Figure 19 Exchange 2020 Keywords Charted

Which vulnerabilities are likely to lead to initial access? You can filter on remote code execution, buffer overflow, and brute force to get the list below.

image

Figure 20 Exchange Data Exploitable Vulnerabilities

Which vulnerabilities could likely lead to privilege escalation?

image

Figure 21 Exchange Privilege Escalation Vulnerability

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Cybersecurity Risk Quantification Copyright © 2024 by Charlene Deaver-Vazquez is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.